IT Management  >   Systems Operations  >  

Systems Security

RSS Feed   
Systems Security Reports
 
Security Starts Here AD: Account Lifecycle Management
sponsored by Quest
WHITE PAPER: Active Directory (AD) security is no laughing matter. Your users are depending on you to grant them the right permissions without delay or compromise, but if your AD suffers a security breach, you and your organization are both in big trouble. Don’t get caught out – read this white paper on Active Directory-centered identity management.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

Quest

The Best of Both Worlds: Hybrid IAM Offers Flexibility and Enhanced Security
sponsored by Quest
WHITE PAPER: Within the identity and access management (IAM) market, the cloud segment is experiencing significant growth – especially among distributed workforces. This white paper discusses how cloud has shaped the IAM market and the benefits of cloud/hybrid IAM offerings.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Quest

Ciphertrust Data Security Platform: Discover, Protect and Control
sponsored by Thales
DATA SHEET: IT security organizations are seeking a data-centric solution that secures the data as it moves from networks to applications and the cloud. When perimeter network controls and endpoint security measures fail, protecting data at rest is the last line of defense. Learn more by reading this data sheet on the CipherTrust data security platform.
Posted: 30 Oct 2020 | Published: 30 Sep 2020

Thales

6 Key Identity and Access Management (IAM) Benefits
sponsored by BIO-key International
EGUIDE: Identity and access management (IAM) has become one of the most effective ways to provision, manage and secure access to an organizations sensitive data. In this e-guide, 6 Key Identity and Access Management (IAM) Benefits, discover 6 observable benefits that users, admins and organizations can realize with an effective IAM program.
Posted: 28 Oct 2020 | Published: 26 Oct 2020

BIO-key International

Detecting Malicious Activity in Large Enterprises
sponsored by Chronicle
ANALYST REPORT: With threat actors retaining the ability to jump from on-premise to cloud to legacy and back again, how can organizations effectively detect suspicious or malicious activity? To learn how to gain visibility, dive into this SANS report and understand how large enterprises can work to detect threats in the face of environmental complexity.
Posted: 30 Oct 2020 | Published: 30 Sep 2020

Chronicle

Why Passwords Stink
sponsored by Beyond Identity, Inc.
WHITE PAPER: Although still widely used across organizations, passwords remain one of the weakest links in an organization’s security efforts – exploited in 81% of hacking-related breaches, according to Verizon. This white paper underlines the problems with passwords and suggests alternative authentication methods – read on to get started.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Beyond Identity, Inc.

Key Considerations for Securing 5G Network Traffic
sponsored by Verizon
WHITE PAPER: The growth of enterprise data is putting pressure on technology professionals to secure and govern it. The generation, networking and storage of this data means that 5G will affect every company’s security posture. So, how can you be prepared for what’s coming? Read this white paper to learn how 5G security will be influenced by evolving threats.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Verizon

Why Control and Visibility are the Keys to Maintaining ERP Data Security in a Remote Environment
sponsored by Appsian
DATA SHEET: Learn why control and visibility are the keys to maintaining ERP data security in a remote environment.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

Appsian

Chronicle Detect: Google XDR
sponsored by Chronicle
DATA SHEET: As threats develop, enterprises will need to purchase software with the goal of detecting threats at scale. They’ll need detections based on high-value security data, and they’ll need a flexible rules syntax that allows their SOC members to command threat overwatch. Read this data sheet to learn about Chronicle, an XDR platform from Google.
Posted: 30 Oct 2020 | Published: 30 Oct 2020

Chronicle

The Key Pillars for Protecting Sensitive Data in Any Organization
sponsored by Thales
WHITE PAPER: Traditionally, companies have focused IT security primarily on perimeter defense. While this is important, it’s not enough. With today’s data scattered across networks, organizations need to apply a security strategy that protects data wherever it is. View this white paper to see the CipherTrust Data Security platform by Thales.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

Thales
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info